-
Click here to register for a live workshop
-
Click here to watch a recording of this workshop
Threat Command - Configuration Best Practices
In this workshop, we'll review the different modules and alerts within Rapid7's threat intelligence solution
In this workshop, we will review the following modules within our threat intelligence solution to ensure you understand the data you are seeing and how to optimize your monitoring of threats:
- Threat Command
- Asset Management - why we need the different configurations
- Dashboards - high level overview of asset monitoring
- Alerts triggered by monitored assets
- Actions available to respond to alerts
- Reporting options
- Threat Intelligence Platform (TIP)
- What is TIP, and how to use it
- Customer use cases and examples
**Vulnerability Risk Analyzer (VRA), Threat Third Party (TTP), and automation/integrations will be covered in a separate workshop, to be built out at a later date
Desired Outcome
Users will come away better able to investigate, interpret, and action alerts